mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-29 14:05:19 +08:00
025bd7c753
This test uses bpf_get_branch_snapshot from a fexit program. The test uses a target function (bpf_testmod_loop_test) and compares the record against kallsyms. If there isn't enough record matching kallsyms, the test fails. Signed-off-by: Song Liu <songliubraving@fb.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Acked-by: Andrii Nakryiko <andrii@kernel.org> Acked-by: John Fastabend <john.fastabend@gmail.com> Link: https://lore.kernel.org/bpf/20210910183352.3151445-4-songliubraving@fb.com
31 lines
731 B
C
31 lines
731 B
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
#ifndef __TRACE_HELPER_H
|
|
#define __TRACE_HELPER_H
|
|
|
|
#include <bpf/libbpf.h>
|
|
|
|
struct ksym {
|
|
long addr;
|
|
char *name;
|
|
};
|
|
|
|
int load_kallsyms(void);
|
|
struct ksym *ksym_search(long key);
|
|
long ksym_get_addr(const char *name);
|
|
|
|
/* open kallsyms and find addresses on the fly, faster than load + search. */
|
|
int kallsyms_find(const char *sym, unsigned long long *addr);
|
|
|
|
/* find the address of the next symbol, this can be used to determine the
|
|
* end of a function
|
|
*/
|
|
int kallsyms_find_next(const char *sym, unsigned long long *addr);
|
|
|
|
void read_trace_pipe(void);
|
|
|
|
ssize_t get_uprobe_offset(const void *addr, ssize_t base);
|
|
ssize_t get_base_addr(void);
|
|
ssize_t get_rel_offset(uintptr_t addr);
|
|
|
|
#endif
|